Datasheet

151
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
(LDP). To display the LFIB local label, enter the show mpls forwarding prefix command. To
display the LDP-allocated local label, enter the show mpls ldp binding prefix mask length
command. This problem is resolved in Release 12.1(26)E. (CSCee72857)
In switch-fabric “bus” mode with either WS-X6516A-GBIC or WS-X6548-GE-TX switching
modules installed, some ingress SPAN traffic is duplicated. This problem is resolved in
Release 12.1(26)E. (CSCee78323)
With multicast support configured on a Supervisor Engine 2, VACLs do not capture traffic for
RSPAN. This problem is resolved in Release 12.1(26)E. (CSCef07017)
A memory leak might occur with Cisco IOS firewall authentication proxy configured. This problem
is resolved in Release 12.1(26)E. (CSCef14971)
After you enter the squeeze command for a 32-MB bootflash device, you cannot write any files to
the bootflash. This problem is resolved in Release 12.1(26)E. (CSCef15418)
With a Supervisor Engine 1, copying files with TFTP takes longer than usual because many
corrected errors occur during the copy process. This problem is resolved in Release 12.1(26)E.
(CSCef26370)
With a Supervisor Engine 2, the software and hardware CEF tables might not be consistent with each
other. This problem is resolved in Release 12.1(26)E. (CSCef27359)
Using SNMP to change the name of VLAN 1002, 1003, 1004, or 1005 causes a traceback and
corrupts the VLAN database. This problem is resolved in Release 12.1(26)E. (CSCef43000)
A specifically crafted Transmission Control Protocol (TCP) connection to a telnet or reverse telnet
port of a Cisco device running Internetwork Operating System (IOS) may block further telnet,
reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases Hypertext Transport
Protocol (HTTP) access to the Cisco device. Telnet, reverse telnet, RSH and SSH sessions
established prior to exploitation are not affected.
All other device services will operate normally. Services such as packet forwarding, routing
protocols and all other communication to and through the device are not affected.
Cisco will make free software available to address this vulnerability. Workarounds, identified below,
are available that protect against this vulnerability.
The Advisory is available at
http://www.cisco.com/warp/public/707/cisco-sa-20040827-telnet.shtml
This problem is resolved in Release 12.1(26)E. (CSCef46191)
In rare situations, a reload might occur if you enter the show mls qos ip command. This problem is
resolved in Release 12.1(26)E. (CSCef50318)
A VACL can match BPDUs. Spanning tree loops can occur if the VACL drops or redirects the
BPDUs. This problem is resolved in Release 12.1(26)E. (CSCef58932)
Over an SSHv2 connection, the output from a command that displays many lines of text pauses until
you press a key. This problem is resolved in Release 12.1(26)E. (CSCef61978)
With a Supervisor Engine 1 and an MSFC2, when the TCAM mask utilization reaches
approximately 50 percent, you might see these TCAM mask exception messages:
00:11:17: %QM-4-TCAM_ENTRY: Hardware TCAM entry capacity exceeded
00:11:17: %QM-SP-4-WARNING: TCAM request replace [lkup=2] status:1
00:11:17: SP: TCAM ASSERT FAILURE: label_alloc_tbl[label].num_if_using[lookup_type]
!= 0: ../const/native-sp/tcam_label.c: 1379
00:11:17: SP: -Traceback= 603C1090 603ACAE0 603AA018 603B7F38 603B8994 6039CE5C
603A53B8 6039D110 6039D254 6039D360 6039D6B4 6039D8E0 600FA6CC 600FA6B8
This problem is resolved in Release 12.1(26)E. (CSCef73019)